[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] is Torbrowser more affected by webservers failing to send their complete certificate chain?



Hi,

I assume that Torbrowser users are more affected by webservers 
that do not send their complete certificate chain (incl. interm. CAs)
due to the fact that torbrowser stores/caches less data (including certs?) persistently.


an example of a page that results in an TLS error page in Torbrowser due to incomplete cert. chain:
https://irtf.org/ 

https://www.ssllabs.com/ssltest/analyze.html?d=irtf.org&s=2001%3a1900%3a3001%3a11%3a0%3a0%3a0%3a2c&hideResults=on&latest


With the growing number of sites deploying HSTS, the impact is even bigger.

Should Torbrowser ship a few common interm. CAs by default? (like the letsencrypt issuing CAs)



-- 
https://twitter.com/nusenu_
https://mastodon.social/@nusenu

Attachment: signature.asc
Description: OpenPGP digital signature

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk